Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29/10/2024, 02:43
Static task
static1
Behavioral task
behavioral1
Sample
96e41c2d613926361afebfc693537919269ae11f3ff721eb4f60bf823258e154.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
96e41c2d613926361afebfc693537919269ae11f3ff721eb4f60bf823258e154.exe
Resource
win10v2004-20241007-en
General
-
Target
96e41c2d613926361afebfc693537919269ae11f3ff721eb4f60bf823258e154.exe
-
Size
1.1MB
-
MD5
03a6863e7931768c020f1a98531e5212
-
SHA1
7fbf21510ba0927b16f9de491e6dace95a35c228
-
SHA256
96e41c2d613926361afebfc693537919269ae11f3ff721eb4f60bf823258e154
-
SHA512
1c38fa9dc160a2b629a875eedf406af168f38380ac53824dd1203c74c1426417c104583858349fc5940f104a1233c33ee8b31a1e9c72f922912b72f55e842980
-
SSDEEP
24576:n2oNUrTTPrtbxvKQt0Zs1bKW2sFTkYFltyi8sxg5SSnvmMKBHJ/G8eZuhnYx:2oN+Tztbt6s1bV1FT5FjTbx4bnvFKjeX
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2868 powershell.exe 2860 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 96e41c2d613926361afebfc693537919269ae11f3ff721eb4f60bf823258e154.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2876 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 21 IoCs
pid Process 2352 96e41c2d613926361afebfc693537919269ae11f3ff721eb4f60bf823258e154.exe 2352 96e41c2d613926361afebfc693537919269ae11f3ff721eb4f60bf823258e154.exe 2352 96e41c2d613926361afebfc693537919269ae11f3ff721eb4f60bf823258e154.exe 2352 96e41c2d613926361afebfc693537919269ae11f3ff721eb4f60bf823258e154.exe 2352 96e41c2d613926361afebfc693537919269ae11f3ff721eb4f60bf823258e154.exe 2352 96e41c2d613926361afebfc693537919269ae11f3ff721eb4f60bf823258e154.exe 2352 96e41c2d613926361afebfc693537919269ae11f3ff721eb4f60bf823258e154.exe 2352 96e41c2d613926361afebfc693537919269ae11f3ff721eb4f60bf823258e154.exe 2352 96e41c2d613926361afebfc693537919269ae11f3ff721eb4f60bf823258e154.exe 2352 96e41c2d613926361afebfc693537919269ae11f3ff721eb4f60bf823258e154.exe 2352 96e41c2d613926361afebfc693537919269ae11f3ff721eb4f60bf823258e154.exe 2352 96e41c2d613926361afebfc693537919269ae11f3ff721eb4f60bf823258e154.exe 2352 96e41c2d613926361afebfc693537919269ae11f3ff721eb4f60bf823258e154.exe 2352 96e41c2d613926361afebfc693537919269ae11f3ff721eb4f60bf823258e154.exe 2352 96e41c2d613926361afebfc693537919269ae11f3ff721eb4f60bf823258e154.exe 2352 96e41c2d613926361afebfc693537919269ae11f3ff721eb4f60bf823258e154.exe 2352 96e41c2d613926361afebfc693537919269ae11f3ff721eb4f60bf823258e154.exe 2352 96e41c2d613926361afebfc693537919269ae11f3ff721eb4f60bf823258e154.exe 2352 96e41c2d613926361afebfc693537919269ae11f3ff721eb4f60bf823258e154.exe 2868 powershell.exe 2860 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2352 96e41c2d613926361afebfc693537919269ae11f3ff721eb4f60bf823258e154.exe Token: SeDebugPrivilege 2868 powershell.exe Token: SeDebugPrivilege 2860 powershell.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 2352 wrote to memory of 2868 2352 96e41c2d613926361afebfc693537919269ae11f3ff721eb4f60bf823258e154.exe 31 PID 2352 wrote to memory of 2868 2352 96e41c2d613926361afebfc693537919269ae11f3ff721eb4f60bf823258e154.exe 31 PID 2352 wrote to memory of 2868 2352 96e41c2d613926361afebfc693537919269ae11f3ff721eb4f60bf823258e154.exe 31 PID 2352 wrote to memory of 2868 2352 96e41c2d613926361afebfc693537919269ae11f3ff721eb4f60bf823258e154.exe 31 PID 2352 wrote to memory of 2860 2352 96e41c2d613926361afebfc693537919269ae11f3ff721eb4f60bf823258e154.exe 33 PID 2352 wrote to memory of 2860 2352 96e41c2d613926361afebfc693537919269ae11f3ff721eb4f60bf823258e154.exe 33 PID 2352 wrote to memory of 2860 2352 96e41c2d613926361afebfc693537919269ae11f3ff721eb4f60bf823258e154.exe 33 PID 2352 wrote to memory of 2860 2352 96e41c2d613926361afebfc693537919269ae11f3ff721eb4f60bf823258e154.exe 33 PID 2352 wrote to memory of 2876 2352 96e41c2d613926361afebfc693537919269ae11f3ff721eb4f60bf823258e154.exe 34 PID 2352 wrote to memory of 2876 2352 96e41c2d613926361afebfc693537919269ae11f3ff721eb4f60bf823258e154.exe 34 PID 2352 wrote to memory of 2876 2352 96e41c2d613926361afebfc693537919269ae11f3ff721eb4f60bf823258e154.exe 34 PID 2352 wrote to memory of 2876 2352 96e41c2d613926361afebfc693537919269ae11f3ff721eb4f60bf823258e154.exe 34 PID 2352 wrote to memory of 2648 2352 96e41c2d613926361afebfc693537919269ae11f3ff721eb4f60bf823258e154.exe 37 PID 2352 wrote to memory of 2648 2352 96e41c2d613926361afebfc693537919269ae11f3ff721eb4f60bf823258e154.exe 37 PID 2352 wrote to memory of 2648 2352 96e41c2d613926361afebfc693537919269ae11f3ff721eb4f60bf823258e154.exe 37 PID 2352 wrote to memory of 2648 2352 96e41c2d613926361afebfc693537919269ae11f3ff721eb4f60bf823258e154.exe 37 PID 2352 wrote to memory of 2668 2352 96e41c2d613926361afebfc693537919269ae11f3ff721eb4f60bf823258e154.exe 38 PID 2352 wrote to memory of 2668 2352 96e41c2d613926361afebfc693537919269ae11f3ff721eb4f60bf823258e154.exe 38 PID 2352 wrote to memory of 2668 2352 96e41c2d613926361afebfc693537919269ae11f3ff721eb4f60bf823258e154.exe 38 PID 2352 wrote to memory of 2668 2352 96e41c2d613926361afebfc693537919269ae11f3ff721eb4f60bf823258e154.exe 38 PID 2352 wrote to memory of 2680 2352 96e41c2d613926361afebfc693537919269ae11f3ff721eb4f60bf823258e154.exe 39 PID 2352 wrote to memory of 2680 2352 96e41c2d613926361afebfc693537919269ae11f3ff721eb4f60bf823258e154.exe 39 PID 2352 wrote to memory of 2680 2352 96e41c2d613926361afebfc693537919269ae11f3ff721eb4f60bf823258e154.exe 39 PID 2352 wrote to memory of 2680 2352 96e41c2d613926361afebfc693537919269ae11f3ff721eb4f60bf823258e154.exe 39 PID 2352 wrote to memory of 1552 2352 96e41c2d613926361afebfc693537919269ae11f3ff721eb4f60bf823258e154.exe 40 PID 2352 wrote to memory of 1552 2352 96e41c2d613926361afebfc693537919269ae11f3ff721eb4f60bf823258e154.exe 40 PID 2352 wrote to memory of 1552 2352 96e41c2d613926361afebfc693537919269ae11f3ff721eb4f60bf823258e154.exe 40 PID 2352 wrote to memory of 1552 2352 96e41c2d613926361afebfc693537919269ae11f3ff721eb4f60bf823258e154.exe 40 PID 2352 wrote to memory of 3040 2352 96e41c2d613926361afebfc693537919269ae11f3ff721eb4f60bf823258e154.exe 41 PID 2352 wrote to memory of 3040 2352 96e41c2d613926361afebfc693537919269ae11f3ff721eb4f60bf823258e154.exe 41 PID 2352 wrote to memory of 3040 2352 96e41c2d613926361afebfc693537919269ae11f3ff721eb4f60bf823258e154.exe 41 PID 2352 wrote to memory of 3040 2352 96e41c2d613926361afebfc693537919269ae11f3ff721eb4f60bf823258e154.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\96e41c2d613926361afebfc693537919269ae11f3ff721eb4f60bf823258e154.exe"C:\Users\Admin\AppData\Local\Temp\96e41c2d613926361afebfc693537919269ae11f3ff721eb4f60bf823258e154.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\96e41c2d613926361afebfc693537919269ae11f3ff721eb4f60bf823258e154.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2868
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\mXJeXQoaGktJCW.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2860
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\mXJeXQoaGktJCW" /XML "C:\Users\Admin\AppData\Local\Temp\tmp13B0.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2876
-
-
C:\Users\Admin\AppData\Local\Temp\96e41c2d613926361afebfc693537919269ae11f3ff721eb4f60bf823258e154.exe"C:\Users\Admin\AppData\Local\Temp\96e41c2d613926361afebfc693537919269ae11f3ff721eb4f60bf823258e154.exe"2⤵PID:2648
-
-
C:\Users\Admin\AppData\Local\Temp\96e41c2d613926361afebfc693537919269ae11f3ff721eb4f60bf823258e154.exe"C:\Users\Admin\AppData\Local\Temp\96e41c2d613926361afebfc693537919269ae11f3ff721eb4f60bf823258e154.exe"2⤵PID:2668
-
-
C:\Users\Admin\AppData\Local\Temp\96e41c2d613926361afebfc693537919269ae11f3ff721eb4f60bf823258e154.exe"C:\Users\Admin\AppData\Local\Temp\96e41c2d613926361afebfc693537919269ae11f3ff721eb4f60bf823258e154.exe"2⤵PID:2680
-
-
C:\Users\Admin\AppData\Local\Temp\96e41c2d613926361afebfc693537919269ae11f3ff721eb4f60bf823258e154.exe"C:\Users\Admin\AppData\Local\Temp\96e41c2d613926361afebfc693537919269ae11f3ff721eb4f60bf823258e154.exe"2⤵PID:1552
-
-
C:\Users\Admin\AppData\Local\Temp\96e41c2d613926361afebfc693537919269ae11f3ff721eb4f60bf823258e154.exe"C:\Users\Admin\AppData\Local\Temp\96e41c2d613926361afebfc693537919269ae11f3ff721eb4f60bf823258e154.exe"2⤵PID:3040
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD55dd9fdc81cc87189c8bdd177668dee28
SHA15e053f40c0499b982ac6425db8a23d4d5506bc24
SHA256bdff8345a64ec334e60db5048dd0f347ff420f58c6cf997d5f86c9aabaf493ef
SHA51283a7e3d9c4fdc0d07da9738b30550385720df5d1d617ebf2bd300db847929ee0fd0f5e54343630c1e3bfa8c205949badb4079f3358ef8fb563664de79dcb997b
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5840af7f22ecc7b07f184a3783d4ce9cb
SHA10cf0ba51a85c546250c5cf4996098a0c5d2c4a52
SHA256f89e5ea0fcb3aaa79ac227f142142e82019bee577833c350472e5c18373c94cc
SHA512e8fdd004377d1c624b4be868cea99161ab246b343c1b5dc647da6f01ccf878aea62cdfbf231bb45ebf2ce25ae31d690b13bb2d6ea5a7203ff968e5e7e06092e3